{"id":458,"date":"2026-03-26T11:01:54","date_gmt":"2026-03-26T11:01:54","guid":{"rendered":"https:\/\/socs.binus.ac.id\/data-science\/?p=458"},"modified":"2026-03-27T03:15:26","modified_gmt":"2026-03-27T03:15:26","slug":"year-3-skills","status":"publish","type":"post","link":"https:\/\/socs.binus.ac.id\/data-science\/2026\/03\/26\/year-3-skills\/","title":{"rendered":"Year 3 \u2014 Specialization &amp; Impact"},"content":{"rendered":"<div style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, sans-serif;color: #2c3e50;line-height: 1.8;max-width: 900px\">\n<p style=\"font-size: 1.05rem;background: #f0f7ff;border-left: 4px solid #2980b9;padding: 18px 22px;border-radius: 0 8px 8px 0;margin-bottom: 12px;color: #2c3e50\">By Year 3, you&#8217;ve mastered the fundamentals and built production-grade systems. Now it&#8217;s time to go deeper. Year 3 is about specialization \u2014 developing expertise in areas that define the frontier of modern data science: understanding language, securing data, and making optimal decisions in complex, uncertain environments.<\/p>\n<p style=\"margin-bottom: 16px;font-size: 1rem;color: #34495e\">This is also the year you sharpen your professional profile. With a strong technical foundation beneath you, you&#8217;ll focus on the kinds of problems that create real, measurable impact \u2014 in industry, government, research, and beyond.<\/p>\n<h3 style=\"font-size: 0.85rem;font-weight: 700;color: #2980b9;text-transform: uppercase;letter-spacing: 0.1em;margin-top: 40px;margin-bottom: 14px;padding-bottom: 8px;border-bottom: 2px solid #ebf5fb\">What You&#8217;ll Be Able to Do<\/h3>\n<div style=\"padding: 0;margin: 0 0 24px 0\">\n<p style=\"padding: 9px 0;border-bottom: 1px solid #f0f4f8;color: #34495e;font-size: 0.97rem;margin: 0\"><span style=\"color: #2980b9;font-weight: bold;margin-right: 10px\">\u2192<\/span>Extract meaning from unstructured text using state-of-the-art NLP techniques, including Large Language Models<\/p>\n<p style=\"padding: 9px 0;border-bottom: 1px solid #f0f4f8;color: #34495e;font-size: 0.97rem;margin: 0\"><span style=\"color: #2980b9;font-weight: bold;margin-right: 10px\">\u2192<\/span>Protect data assets through security principles, threat modeling, and privacy-preserving design<\/p>\n<p style=\"padding: 9px 0;border-bottom: 1px solid #f0f4f8;color: #34495e;font-size: 0.97rem;margin: 0\"><span style=\"color: #2980b9;font-weight: bold;margin-right: 10px\">\u2192<\/span>Go beyond prediction to prescription \u2014 formulating and solving optimization problems that recommend the best course of action<\/p>\n<p style=\"padding: 9px 0;border-bottom: 1px solid #f0f4f8;color: #34495e;font-size: 0.97rem;margin: 0\"><span style=\"color: #2980b9;font-weight: bold;margin-right: 10px\">\u2192<\/span>Model uncertainty and simulate complex decision scenarios using advanced mathematical tools<\/p>\n<p style=\"padding: 9px 0;color: #34495e;font-size: 0.97rem;margin: 0\"><span style=\"color: #2980b9;font-weight: bold;margin-right: 10px\">\u2192<\/span>Apply metaheuristic and reinforcement learning approaches to real-world decision problems<\/p>\n<\/p><\/div>\n<h3 style=\"font-size: 0.85rem;font-weight: 700;color: #2980b9;text-transform: uppercase;letter-spacing: 0.1em;margin-top: 40px;margin-bottom: 14px;padding-bottom: 8px;border-bottom: 2px solid #ebf5fb\">Data Science Courses<\/h3>\n<table style=\"width: 100%;border-collapse: collapse;margin: 16px 0 32px;border-radius: 10px;overflow: hidden\">\n<thead>\n<tr style=\"background: #1a2f4e;color: #ffffff\">\n<th style=\"padding: 14px 18px;text-align: left;font-size: 0.8rem;font-weight: 600;text-transform: uppercase;letter-spacing: 0.08em\">Course<\/th>\n<th style=\"padding: 14px 18px;text-align: left;font-size: 0.8rem;font-weight: 600;text-transform: uppercase;letter-spacing: 0.08em\">What You&#8217;ll Learn<\/th>\n<th style=\"padding: 14px 18px;text-align: left;font-size: 0.8rem;font-weight: 600;text-transform: uppercase;letter-spacing: 0.08em\">Key Skills &amp; Tools<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #1a2f4e;font-weight: 600;min-width: 180px\"><strong>Text Mining<\/strong><\/td>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #34495e\">Unlock the intelligence hidden in text. Learn the full NLP pipeline \u2014 from preprocessing and text representation (TF-IDF, Word2Vec, BERT) to text classification, summarization, topic modeling, and working with Large Language Models. Apply these techniques to real business and research problems.<\/td>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #34495e\">Python NLP, TF-IDF, Word2Vec, BERT, LLMs, text classification, LDA, BERTopic, extractive and abstractive summarization<\/td>\n<\/tr>\n<tr style=\"background: #f7fafd\">\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #1a2f4e;font-weight: 600;min-width: 180px\"><strong>Data Security<\/strong><\/td>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #34495e\">Data is only as valuable as it is trustworthy \u2014 and only as powerful as it is protected. Learn the principles of data security: threat modeling, access control, encryption, data privacy regulations, and how to secure data systems in cloud environments. Build the security mindset every data scientist needs.<\/td>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #34495e\">Data security principles, threat modeling, cloud data security, privacy frameworks, access control design<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #1a2f4e;font-weight: 600;min-width: 180px\"><strong>Prescriptive Data Science<\/strong><\/td>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #34495e\">Predictive models tell you what <em>will<\/em> happen. Prescriptive models tell you what to <em>do<\/em> about it. Learn to formulate and solve optimization problems using linear, integer, and nonlinear programming \u2014 and apply decision theory, Monte Carlo simulation, and metaheuristic algorithms to find optimal solutions under real-world constraints.<\/td>\n<td style=\"padding: 14px 18px;vertical-align: top;font-size: 0.95rem;border-bottom: 1px solid #e8edf3;color: #34495e\">Linear programming (LP), integer programming, nonlinear programming, decision theory, sensitivity analysis, Monte Carlo simulation, genetic algorithms, particle swarm optimization, reinforcement learning for decisions<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 style=\"font-size: 0.85rem;font-weight: 700;color: #2980b9;text-transform: uppercase;letter-spacing: 0.1em;margin-top: 40px;margin-bottom: 14px;padding-bottom: 8px;border-bottom: 2px solid #ebf5fb\">Beyond the Data Science Courses<\/h3>\n<p style=\"margin-bottom: 16px;font-size: 1rem;color: #34495e\">Year 3 rounds out your degree with courses in research methodology, software engineering, and entrepreneurship \u2014 preparing you to lead projects, communicate findings, and think beyond the algorithm to the systems and organizations that use it.<\/p>\n<p style=\"background: #1a2f4e;color: #d6e8f7;padding: 22px 26px;border-radius: 10px;margin-top: 32px;font-style: italic;font-size: 1.05rem;line-height: 1.7\">Year 3 is where you become more than a technician. You become a data scientist who understands context, thinks strategically, and builds solutions that hold up in the real world.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By Year 3, you&#8217;ve mastered the fundamentals and built production-grade systems. Now it&#8217;s time to go deeper. Year 3 is about specialization \u2014 developing expertise in areas that define the frontier of modern data science: understanding language, securing data, and making optimal decisions in complex, uncertain environments. This is also the year you sharpen your [&hellip;]<\/p>\n","protected":false},"author":709,"featured_media":473,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-courses"],"_links":{"self":[{"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/posts\/458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/users\/709"}],"replies":[{"embeddable":true,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/comments?post=458"}],"version-history":[{"count":1,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/posts\/458\/revisions"}],"predecessor-version":[{"id":459,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/posts\/458\/revisions\/459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/media\/473"}],"wp:attachment":[{"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/media?parent=458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/categories?post=458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/socs.binus.ac.id\/data-science\/wp-json\/wp\/v2\/tags?post=458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}